Artykuły w czasopismach na temat „Private Data Analysis”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Private Data Analysis”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Shi, Elaine, T. H. Hubert Chan, Eleanor Rieffel i Dawn Song. "Distributed Private Data Analysis". ACM Transactions on Algorithms 13, nr 4 (21.12.2017): 1–38. http://dx.doi.org/10.1145/3146549.
Pełny tekst źródłaAbdul Manap, Nazura, Mohamad Rizal Abd Rahman i Siti Nur Farah Atiqah Salleh. "HEALTH DATA OWNERSHIP IN MALAYSIA PUBLIC AND PRIVATE HEALTHCARE: A LEGAL ANALYSIS OF HEALTH DATA PRIVACY IN THE AGE OF BIG DATA". International Journal of Law, Government and Communication 7, nr 30 (31.12.2022): 33–41. http://dx.doi.org/10.35631/ijlgc.730004.
Pełny tekst źródłaDwork, Cynthia, Frank McSherry, Kobbi Nissim i Adam Smith. "Calibrating Noise to Sensitivity in Private Data Analysis". Journal of Privacy and Confidentiality 7, nr 3 (30.05.2017): 17–51. http://dx.doi.org/10.29012/jpc.v7i3.405.
Pełny tekst źródłaProserpio, Davide, Sharon Goldberg i Frank McSherry. "Calibrating data to sensitivity in private data analysis". Proceedings of the VLDB Endowment 7, nr 8 (kwiecień 2014): 637–48. http://dx.doi.org/10.14778/2732296.2732300.
Pełny tekst źródłaMandal, Sanjeev Kumar, Amit Sharma, Santosh Kumar Henge, Sumaira Bashir, Madhuresh Shukla i Asim Tara Pathak. "Secure data encryption key scenario for protecting private data security and privacy". Journal of Discrete Mathematical Sciences and Cryptography 27, nr 2 (2024): 269–81. http://dx.doi.org/10.47974/jdmsc-1881.
Pełny tekst źródłaAppenzeller, Arno, Moritz Leitner, Patrick Philipp, Erik Krempel i Jürgen Beyerer. "Privacy and Utility of Private Synthetic Data for Medical Data Analyses". Applied Sciences 12, nr 23 (1.12.2022): 12320. http://dx.doi.org/10.3390/app122312320.
Pełny tekst źródłaLobo-Vesga, Elisabet, Alejandro Russo i Marco Gaboardi. "A Programming Language for Data Privacy with Accuracy Estimations". ACM Transactions on Programming Languages and Systems 43, nr 2 (lipiec 2021): 1–42. http://dx.doi.org/10.1145/3452096.
Pełny tekst źródłaDwork, Cynthia. "A firm foundation for private data analysis". Communications of the ACM 54, nr 1 (styczeń 2011): 86–95. http://dx.doi.org/10.1145/1866739.1866758.
Pełny tekst źródłaBos, Joppe W., Kristin Lauter i Michael Naehrig. "Private predictive analysis on encrypted medical data". Journal of Biomedical Informatics 50 (sierpień 2014): 234–43. http://dx.doi.org/10.1016/j.jbi.2014.04.003.
Pełny tekst źródłaAher, Ujjwala Bal, Amol A. Bhosle, Prachi Palsodkar, Swati Bula Patil, Nishchay Koul i Purva Mange. "Secure data sharing in collaborative network environments for privacy-preserving mechanisms". Journal of Discrete Mathematical Sciences and Cryptography 27, nr 2-B (2024): 855–65. http://dx.doi.org/10.47974/jdmsc-1961.
Pełny tekst źródłaSramka, Michal. "Data mining as a tool in privacy-preserving data publishing". Tatra Mountains Mathematical Publications 45, nr 1 (1.12.2010): 151–59. http://dx.doi.org/10.2478/v10127-010-0011-z.
Pełny tekst źródłaCho, Cheol-kyu. "Big Data Analysis Research on Private Investigation Systems". K Association of Education Research 8, nr 3 (30.09.2023): 273–87. http://dx.doi.org/10.48033/jss.8.3.15.
Pełny tekst źródłaZhu, Tianqing, Gang Li, Wanlei Zhou i Philip S. Yu. "Differentially Private Data Publishing and Analysis: A Survey". IEEE Transactions on Knowledge and Data Engineering 29, nr 8 (1.08.2017): 1619–38. http://dx.doi.org/10.1109/tkde.2017.2697856.
Pełny tekst źródłaHamza, Rafik, Alzubair Hassan, Awad Ali, Mohammed Bakri Bashir, Samar M. Alqhtani, Tawfeeg Mohmmed Tawfeeg i Adil Yousif. "Towards Secure Big Data Analysis via Fully Homomorphic Encryption Algorithms". Entropy 24, nr 4 (6.04.2022): 519. http://dx.doi.org/10.3390/e24040519.
Pełny tekst źródłaOyekan, Basirat. "DEVELOPING PRIVACY-PRESERVING FEDERATED LEARNING MODELS FOR COLLABORATIVE HEALTH DATA ANALYSIS ACROSS MULTIPLE INSTITUTIONS WITHOUT COMPROMISING DATA SECURITY". Journal of Knowledge Learning and Science Technology ISSN: 2959-6386 (online) 3, nr 3 (25.08.2024): 139–64. http://dx.doi.org/10.60087/jklst.vol3.n3.p139-164.
Pełny tekst źródłaMiranda-Pascual, Àlex, Patricia Guerra-Balboa, Javier Parra-Arnau, Jordi Forné i Thorsten Strufe. "SoK: Differentially Private Publication of Trajectory Data". Proceedings on Privacy Enhancing Technologies 2023, nr 2 (kwiecień 2023): 496–516. http://dx.doi.org/10.56553/popets-2023-0065.
Pełny tekst źródłaFerrara, Pietro, Luca Olivieri i Fausto Spoto. "Static Privacy Analysis by Flow Reconstruction of Tainted Data". International Journal of Software Engineering and Knowledge Engineering 31, nr 07 (lipiec 2021): 973–1016. http://dx.doi.org/10.1142/s0218194021500303.
Pełny tekst źródłaShen, Wenquan, Shuhui Wu i Yuanhong Tao. "CLDP-pFedAvg: Safeguarding Client Data Privacy in Personalized Federated Averaging". Mathematics 12, nr 22 (20.11.2024): 3630. http://dx.doi.org/10.3390/math12223630.
Pełny tekst źródłaLi, Bing, Hong Zhu i Meiyi Xie. "Releasing Differentially Private Trajectories with Optimized Data Utility". Applied Sciences 12, nr 5 (25.02.2022): 2406. http://dx.doi.org/10.3390/app12052406.
Pełny tekst źródłaAL-Mafrji, Ahmad Abdullah Mohammed, i Ahmed Burhan Mohammed. "Analysis of Patients Data Using Fuzzy Expert System". Webology 19, nr 1 (20.01.2022): 4027–34. http://dx.doi.org/10.14704/web/v19i1/web19265.
Pełny tekst źródłaXu, Xiaolong, Xuan Zhao, Feng Ruan, Jie Zhang, Wei Tian, Wanchun Dou i Alex X. Liu. "Data Placement for Privacy-Aware Applications over Big Data in Hybrid Clouds". Security and Communication Networks 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/2376484.
Pełny tekst źródłaJi, Tianxi, Pan Li, Emre Yilmaz, Erman Ayday, Yanfang (Fanny) Ye i Jinyuan Sun. "Differentially private binary- and matrix-valued data query". Proceedings of the VLDB Endowment 14, nr 5 (styczeń 2021): 849–62. http://dx.doi.org/10.14778/3446095.3446106.
Pełny tekst źródłaAriful Islam, Md, i Rezwanul Hasan Rana. "Determinants of bank profitability for the selected private commercial banks in Bangladesh: a panel data analysis". Banks and Bank Systems 12, nr 3 (18.10.2017): 179–92. http://dx.doi.org/10.21511/bbs.12(3-1).2017.03.
Pełny tekst źródłaAL-SAGGAF, YESLAM. "The Use of Data Mining by Private Health Insurance Companies and Customers’ Privacy". Cambridge Quarterly of Healthcare Ethics 24, nr 3 (10.06.2015): 281–92. http://dx.doi.org/10.1017/s0963180114000607.
Pełny tekst źródłaAvella-Medina, Marco. "The Role of Robust Statistics in Private Data Analysis". CHANCE 33, nr 4 (1.10.2020): 37–42. http://dx.doi.org/10.1080/09332480.2020.1847958.
Pełny tekst źródłaUtaliyeva, Assem, i Yoon-Ho Choi. "Two-Fold Differentially Private Mechanism for Big Data Analysis". Journal of Korean Institute of Communications and Information Sciences 49, nr 3 (31.03.2024): 393–400. http://dx.doi.org/10.7840/kics.2024.49.3.393.
Pełny tekst źródłaChunxia Wang, Chunxia Wang, Qiuyu Zhang Chunxia Wang i Yan Yan Qiuyu Zhang. "Differentially Private Feature Selection Based on Dynamic Relevance for Correlated Data". 電腦學刊 34, nr 1 (luty 2023): 157–73. http://dx.doi.org/10.53106/199115992023023401012.
Pełny tekst źródłaBatool, Sumaira, Imran Abbs, Fatima Farooq i Ishtiaq Ahmad. "Comparative Efficiency Analysis of Public and Private Colleges of Multan District: Data Envelope Approach Analysis". Review of Economics and Development Studies 2, nr 1 (30.06.2016): 69–80. http://dx.doi.org/10.26710/reads.v2i1.125.
Pełny tekst źródłaChen, Z. F., J. J. Shuai, F. J. Tian, W. Y. Li, S. H. Zang i X. Z. Zhang. "An Improved Privacy Protection Algorithm for Multimodal Data Fusion". Scientific Programming 2022 (23.08.2022): 1–7. http://dx.doi.org/10.1155/2022/4189148.
Pełny tekst źródłaZhang, Hao, Yewei Xia, Yixin Ren, Jihong Guan i Shuigeng Zhou. "Differentially Private Nonlinear Causal Discovery from Numerical Data". Proceedings of the AAAI Conference on Artificial Intelligence 37, nr 10 (26.06.2023): 12321–28. http://dx.doi.org/10.1609/aaai.v37i10.26452.
Pełny tekst źródłaKang, Shujing, Xia Lin, Kaiqi Yang, Jianing Sun i Daiteng Ren. "Data Elements Empowering Breakthrough Innovation Enterprises: A Current Analysis and Improvement Pathways". Journal of Management and Social Development 1, nr 3 (maj 2024): 221–26. http://dx.doi.org/10.62517/jmsd.202412332.
Pełny tekst źródłade Jong, Jins, Bart Kamphorst i Shannon Kroes. "Differentially Private Block Coordinate Descent for Linear Regression on Vertically Partitioned Data". Journal of Cybersecurity and Privacy 2, nr 4 (9.11.2022): 862–81. http://dx.doi.org/10.3390/jcp2040044.
Pełny tekst źródłaJia, Dongning, Bo Yin i Xianqing Huang. "Association Analysis of Private Information in Distributed Social Networks Based on Big Data". Wireless Communications and Mobile Computing 2021 (4.06.2021): 1–12. http://dx.doi.org/10.1155/2021/1181129.
Pełny tekst źródłaSwanberg, Marika, Ira Globus-Harris, Iris Griffith, Anna Ritz, Adam Groce i Andrew Bray. "Improved Differentially Private Analysis of Variance". Proceedings on Privacy Enhancing Technologies 2019, nr 3 (1.07.2019): 310–30. http://dx.doi.org/10.2478/popets-2019-0049.
Pełny tekst źródłaPeng, Shin-yi. "Public–Private Interactions in Privacy Governance". Laws 11, nr 6 (26.10.2022): 80. http://dx.doi.org/10.3390/laws11060080.
Pełny tekst źródłaMayuri Arun Gaikwad. "Homomorphic Encryption and Secure Multi-Party Computation: Mathematical Tools for Privacy-Preserving Data Analysis in the Cloud". Panamerican Mathematical Journal 33, nr 2 (4.07.2024): 75–88. http://dx.doi.org/10.52783/pmj.v33.i2.876.
Pełny tekst źródłaBasha, M. John, T. Satyanarayana Murthy, A. S. Valarmathy, Ahmed Radie Abbas, Djuraeva Gavhar, R. Rajavarman i N. Parkunam. "Privacy-Preserving Data Mining and Analytics in Big Data". E3S Web of Conferences 399 (2023): 04033. http://dx.doi.org/10.1051/e3sconf/202339904033.
Pełny tekst źródłaWood, Alexander, Vladimir Shpilrain, Kayvan Najarian i Delaram Kahrobaei. "Private naive bayes classification of personal biomedical data: Application in cancer data analysis". Computers in Biology and Medicine 105 (luty 2019): 144–50. http://dx.doi.org/10.1016/j.compbiomed.2018.11.018.
Pełny tekst źródłaBălă, Raluca-Maria, i Elena-Maria Prada. "Migration and Private Consumption in Europe: A Panel Data Analysis". Procedia Economics and Finance 10 (2014): 141–49. http://dx.doi.org/10.1016/s2212-5671(14)00287-1.
Pełny tekst źródłaJiang, Yangdi, Yi Liu, Xiaodong Yan, Anne-Sophie Charest, Linglong Kong i Bei Jiang. "Analysis of Differentially Private Synthetic Data: A Measurement Error Approach". Proceedings of the AAAI Conference on Artificial Intelligence 38, nr 19 (24.03.2024): 21206–13. http://dx.doi.org/10.1609/aaai.v38i19.30114.
Pełny tekst źródłaXing, Hongjun, i Darchia Maia. "Analysis on the Development Strategy of Private Education Based on Data Mining Algorithm". Mathematical Problems in Engineering 2022 (11.07.2022): 1–10. http://dx.doi.org/10.1155/2022/2783398.
Pełny tekst źródłaDE CAPITANI DI VIMERCATI, SABRINA, SARA FORESTI, GIOVANNI LIVRAGA i PIERANGELA SAMARATI. "DATA PRIVACY: DEFINITIONS AND TECHNIQUES". International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 20, nr 06 (grudzień 2012): 793–817. http://dx.doi.org/10.1142/s0218488512400247.
Pełny tekst źródłaLi, Yanshu, i Daowei Zhang. "A Spatial Panel Data Analysis of Tree Planting in the US South". Southern Journal of Applied Forestry 31, nr 4 (1.11.2007): 192–98. http://dx.doi.org/10.1093/sjaf/31.4.192.
Pełny tekst źródłaLi, Yiwei, Shuai Wang i Qilong Wu. "Convergence Analysis for Differentially Private Federated Averaging in Heterogeneous Settings". Mathematics 13, nr 3 (2.02.2025): 497. https://doi.org/10.3390/math13030497.
Pełny tekst źródłaHasan, Fayyad-Kazan, Kassem-Moussa Sondos, Hejase Hussin J i Hejase Ale J. "Forensic analysis of private browsing mechanisms: Tracing internet activities". Journal of Forensic Science and Research 5, nr 1 (8.03.2021): 012–19. http://dx.doi.org/10.29328/journal.jfsr.1001022.
Pełny tekst źródłaBalaine, Lorraine, Cathal Buckley i Emma J. Dillon. "Mixed public-private and private extension systems: A comparative analysis using farm-level data from Ireland". Land Use Policy 117 (czerwiec 2022): 106086. http://dx.doi.org/10.1016/j.landusepol.2022.106086.
Pełny tekst źródłaLiu, Haifei, Weishu Li i Yulian Liu. "Research on the Integration of Data Statistics and Analysis in the Training of Private Equity Talents". Scientific Journal of Economics and Management Research 6, nr 12 (27.12.2024): 225–30. https://doi.org/10.54691/wrjjav50.
Pełny tekst źródłaSenekane, Makhamisa. "Differentially Private Image Classification Using Support Vector Machine and Differential Privacy". Machine Learning and Knowledge Extraction 1, nr 1 (20.02.2019): 483–91. http://dx.doi.org/10.3390/make1010029.
Pełny tekst źródłaKulkarni, Shantanu, Pranjali Bawane, Rahul S.S, M. B. Bagwan i Shailly Gupta. "Surgical Confidentiality and Data Protection: A Legal Analysis". Journal of Neonatal Surgery 14, nr 2S (10.02.2025): 87–96. https://doi.org/10.52783/jns.v14.1661.
Pełny tekst źródłaDeruelle, Thibaud, Veronika Kalouguina, Philipp Trein i Joël Wagner. "Designing privacy in personalized health: An empirical analysis". Big Data & Society 10, nr 1 (styczeń 2023): 205395172311586. http://dx.doi.org/10.1177/20539517231158636.
Pełny tekst źródła